General

  • Target

    4edd5fdd109ffd7b30cfd1199f165945be4878a1fde4193046d46e798c3ab68f

  • Size

    35KB

  • Sample

    241120-fmphmawnbq

  • MD5

    f774b8cf0bcb530bf08e209b2a69c0f5

  • SHA1

    bd1998f9375ba97526878cbbd6302c4f85b43fa2

  • SHA256

    4edd5fdd109ffd7b30cfd1199f165945be4878a1fde4193046d46e798c3ab68f

  • SHA512

    207ba876872105df91f7232abc24f81f216fb953a3b1db830243b021ac3de5ff5c5980d3603be5bb9cf55cbe218a51dc327781c317f3758580e93781396b924f

  • SSDEEP

    768:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJjj6ehEnmEzk:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2V

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/oo/aa/se.html

Targets

    • Target

      4edd5fdd109ffd7b30cfd1199f165945be4878a1fde4193046d46e798c3ab68f

    • Size

      35KB

    • MD5

      f774b8cf0bcb530bf08e209b2a69c0f5

    • SHA1

      bd1998f9375ba97526878cbbd6302c4f85b43fa2

    • SHA256

      4edd5fdd109ffd7b30cfd1199f165945be4878a1fde4193046d46e798c3ab68f

    • SHA512

      207ba876872105df91f7232abc24f81f216fb953a3b1db830243b021ac3de5ff5c5980d3603be5bb9cf55cbe218a51dc327781c317f3758580e93781396b924f

    • SSDEEP

      768:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJjj6ehEnmEzk:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2V

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks